OSINT Tools Worth Sharing

P { margin-bottom: 0.08in; }A:link { }
Open source intelligence is the next
big thing, it will change the processes and systems of current
intelligence structure. By looking at broader perspective, we can
easily find the application of OSINT from business intelligence to
security agencies, in short marketing firms, media houses, hackers,
security and military agencies blah blah blah can get benefits out of
from OSINT. But how, when and where to use OSINT ? This is actually a
topic to discuss because if you have a weapon but you don’t know how,
when and where to use, then believe me this weapon is useless.
The answer of how to use open source
intelligence is hidden on the tools and techniques, so in this
article we will cover some great tools that are available in the
market; and you can utilize them to make your hacking practice
efficient (if you know what I mean). Some of the tools listed below
are available on Kali Linux (the successor of backtrack) but if you
are using any other distribution or even Windows OS then you can
download and use them.

H2 { margin-bottom: 0.08in; }H2.cjk { font-family: “Droid Sans”; }H2.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }A:link { }


Maltego is the tool that can gather
information (believe me, it can gather). Maltego is a unique platform
developed to deliver a clear threat picture to the environment that
an organization owns and operates. Maltego’s unique advantage is to
demonstrate the complexity and severity of single points of failure
as well as trust relationships that exist currently within the scope
of your infrastructure. 

H2 { margin-bottom: 0.08in; }H2.cjk { font-family: “Droid Sans”; }H2.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }A:link { }


SHODAN is a search engine that lets you
find specific computers (routers, servers, etc.) using a variety of
filters. Some have also described it as a public port scan directory
or a search engine of banners.

H3 { margin-bottom: 0.08in; }H3.western { font-family: “Liberation Sans”,sans-serif; }H3.cjk { font-family: “Droid Sans”; }H3.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }A:link { }

H2 { margin-bottom: 0.08in; }H2.cjk { font-family: “Droid Sans”; }H2.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }A:link { }


theHarvester is intended to help Penetration testers in the early
stages of the penetration test in order to understand the customer
footprint on the Internet. It is also useful for anyone that wants to
know what an attacker can see about their organization.

The objective of this program is to gather emails, subdomains,
hosts, employee names, open ports and banners from different public
sources like search engines, PGP key servers and SHODAN computer

Now we want to know about your favorite tool, it might be possible that you would not find your tool in the list aforementioned list; but it is not a big deal because it is not a final list. You can share the best tools other than mentioned one. I personally like and enjoy thehavester and maltego, what do you like most ?

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...